A Mutable Log

Key security concerns

Concern Meaning Mechanisms
Authenticity Are you really who you say you are? secret keys, biometrics
Confidentiality Is information secure and privacy protected? cryptography
Data Integrity Can the data be changed or corrupted? hashing
Access control Will the information be accessed only by authorized parties? access control lists, role based security
Availability Will the information be available when needed? disaster planning, recovering from crack attack, clustering, data backup/redundancy
Non repudiation what is the proof of a digital transaction? digital signatures